Testable Bounded Degree Graph Properties Are Random Order Streamable

Total Page:16

File Type:pdf, Size:1020Kb

Testable Bounded Degree Graph Properties Are Random Order Streamable Testable Bounded Degree Graph Properties Are Random Order Streamable Morteza Monemizadeh Rutgers , Amazon Joint work with: S. Muthukrishnan, Pan Peng, Christian Sohler Sparse Graphs Given a graph G(V,E) where n=|V| and m = |E| = O(n). Examples d-Bounded Degree Graphs Given a graph G(V,E) whose maximum degree d is constant, where n=|V| and 0 ≤ m = |E| ≤ nd. (Ɛ,k,d)-Hyperfinite G(V,E) G is (Ɛ,k,d)-hyperfinite graph if we remove a set of at most Ɛdn edges of G s.t. the remaining graph has connected components of size at most k. Arboricity ☛ Is a way to quantify the density of a graph G(V,E). ☛ c = maxU {|E(U)|/(|U|-1)} where U is a subset of V. ☛ G can be partitioned into at most c forests. ☛ Planar graphs have arboricity c = 3. Maximum Matching Given a graph G(V,E), find a set of pairwise non-adjacent of maximum size, i.e., no two edges share a common edge. Example Example Maximum Matching ☛ 30-years-old algorithm due to Micali and Vazirani with running time m√n. ☛ Greedy algorithm returns maximal matching (2- approximation of maximum matching). Maximum Matching ☛ 30-years-old algorithm due to Micali and Vazirani with running time m√n. ☛ Greedy algorithm returns maximal matching (2- approximation of maximum matching). Big Data Models for Graphs ☞ Data Streams: Graph Streams ☞ Property Testing: Testing Graph Properties. ☞ Sublinear Time Approximation Algorithms Streaming Model 2 3 1 7 4 5 8 6 Stream S = Streaming Model 2 3 1 7 4 5 8 6 Stream S = (2,4) , (3,6) , (2,7) , (4,6), ... Graph Streams ☞ Adverserial or Random Order Model ☞ O(c)-approximate the size of matching in c- bounded arboricity graphs using O(clog2 n) space in adversarial model. ☞ O(polylog n)-approximate the size of matching in general graphs using O(polylog n) space in random order model. Graph Streams ☞ Adverserial or Random Order Model In general, it is not clear which graph problems can be solved with much smaller space in the random order stream than in the adversary order stream. Graph Streams ☞ Semi-Streaming Model: O(n polylog(n)) space ☞ Sparse Graphs: m=O(n) ☞ O(polylog(n)) or even better O(1) space Constant Query Property Testing d-Bounded Graph Given a graph G(V,E) whose maximum degree d is constant, where n=|V| and 0 ≤ m = |E| ≤ nd. Adjacency List Model Query access to the adjacency list of G: For any vertex v and index i one can query the i-th neighbor (if exists) of v in constant time. Property Testing A property ∏n for d-bounded n-vertex graphs is testable with query complexity q, if for every �, d and n, there exists an algorithm that performs q(n,d, �) queries to the adjacency list of the graph and with probability 2/3 ❑ Accepts any n-vertex d-bounded graph G satisfying ∏n, ❑ Rejects any n-vertex d-bounded graph G that is �-far from satisfying ∏n, ❑ If q(d, �) is independent of n, we call ∏n constant query testable. Property Testing Theorem: Any d-bounded graph property that is constant-query testable in the adjacency list model can be tested in random order streaming model with constant space. Examples Adversary Order Model: Testing k-edge connectivity, k-vertex connectivity and cycle-freeness of d-bounded degree graphs needs �(n1-O(ε)) space. Dynamic graph stream algorithms in o(n) space. Huang and Peng, ICALP 2016. Examples Random Order Model: k-edge connectivity, k-vertex connectivity and cycle- freeness of d-bounded degree graphs are testable in constant space in the random order stream model, since they are constant-query testable in the adjacency list model. Property testing in bounded degree graphs. Oded Goldreich and Dana Ron, Algorithmica 2002 Property Testing Proof (sketch): Every constant query property tester ❑ Samples a constant number of vertices ❑ Explores the k-discs of these vertices? ❑ Makes deterministic decisions based on the explored graph. k-disc The local neighborhood of depth k of a vertex is the subgraph induced by all vertices of distance at most k. v k-disc The local neighborhood of depth k of a vertex is the subgraph induced by all vertices of distance at most k. … … v k-disc The local neighborhood of depth k of a vertex is the subgraph induced by all vertices of distance at most k. … … v A k-disc has at most dk+1 vertices and dk+2 edges. Constant-Time Approximation Algorithms Adjacency List Model Query access to the adjacency list of G: For any vertex v index i one can query the the i-th neighbor (if exists) of v in constant time. (x,y)-Approximation We call a value t an (x,y)-approximation for the problem P, if for any instance I, we have OPT(I) ≤ t ≤ x⋅OPT(I)+y For a minimization optimization problem P and an instance I, we let OPT(I) denote the value of some optimal solution of I. O(1)-time Approximation Algorithm Theorem: There exists an algorithm that uses constant space in the random order model, and with probability 2/3, (1,ɛn)-approximates the size of a maximal matching. Based on Locality Lemma due to Nguyen and Onak, FOCS’08 O(1)-time Approximation Algorithm Similar result holds for minimum vertex cover, maximum matching, the number of connected components. O(1)-time Approximation Algorithm Theorem: There exists an algorithm that uses constant space in the random order model, and with probability 2/3, (1±ɛ)-approximates the size of a maximal matching. O(1)-time Approximation Algorithm Greedy Matching Stream : e1 e2 e3 e4 … ei … Current Matching M O(1)-time Approximation Algorithm Greedy Matching … Stream : e1 e2 e3 e4 … ei … Is ei in M? Current Matching M O(1)-time Approximation Algorithm .3 .4 … .7 .4 … v .5 .6 .6 .2 k-Disc Primitive in Data Streams k-disc Primitive Given a random order stream S of edges of an underlying d-bounded degree graph G(V,E). Sample the full k-disc of a vertex v (almost) uniformly at random. 2-Pass Streaming Algorithm 2-Pass Algorithm First Pass: Sample a set S of (dk+2)! vertices and collect their observed k-discs in S. In expectation, there exists at least one vertex in S whose full k-disc is observed. 2-Pass Algorithm Second Pass: Find the degree of vertices in (partially explored) k-discs of the vertices in S. Report the k-disc of a vertex in S that is fully explored. 1-Pass Streaming Algorithm Partial Order Hd,k={Δ1,…,Δx} : The set of all k-disc isomorphism types. Δi≽Δj : Δj is root-preserving isomorphic to some subgraph of Δi. ≽ Δi Δj Ordering Order all the k-disc types Δ1,…, Δx such that if Δi≽Δj, then i ≤ j. … … … Δi Δj Ordering Order all the k-disc types Δ1,…, Δx such that if Δi≽Δj, then i ≤ j. … … … Δi Δj G(j): All the indices i, except j itself, such that Δi≽Δj. Frequency Vector F(G,d) Vi: The set of vertices with k-disc isomorphic to Δi , Vi={v ∈ V: disck,G(v) ≅ Δi} … … … Δi Δj 10010 10 2324 8273 9744 |Vi| fi=|Vi|/n Marginal Probability Let S be a random order Stream. Let v be a vertex with k-disc isomorphic to Δi. Marginal Probability: The probability λ(Δj|Δi) that the observed k-disc of v in S is disck(v,S) ≅ Δj for any j such that Δi≽Δj. e’ e ≽ e e’’ Δi Δj Stream S: …, e’,…, e’’, …, e,… 1-Pass Algorithm Preprocssing: Sample a set T of O(2(dk+2)! /Ɛ2) vertices. 1-Pass Algorithm Preprocssing: Sample a set T of O(2(dk+2)! /Ɛ2) vertices. Streaming: For each vertex v ∈ T: ☞ Collect the observed k-disc disck(v,S) from the stream S. ☞ Let Hv be disck(v,S). 1-Pass Algorithm Postprocessing: Let H= ∪v ∈ T Hv . 1-Pass Algorithm Postprocessing: Let H= ∪v ∈ T Hv . For i =1 to x where x=|F(G,d)| 1-Pass Algorithm Postprocessing: Let H= ∪v ∈ T Hv . For i =1 to x where x=|F(G,d)| ☞ Yi=|{v ∈ T: disck,H(v) ≅ Δi}|/|T| 1-Pass Algorithm Postprocessing: Let H= ∪v ∈ T Hv . For i =1 to x where x=|F(G,d)| ☞ Yi=|{v ∈ T: disck,H(v) ≅ Δi}|/|T| ☞ -1 Xi=(Yi-∑j∈G(i) Xj· λ(Δi|Δj))· λ (Δi|Δi) G(i): All the indices j, except i itself, such that Δj≽Δi. 1-Pass Algorithm Postprocessing: Let H= ∪v ∈ T Hv . For i =1 to x where x=|F(G,d)| ☞ Yi=|{v ∈ T: disck,H(v) ≅ Δi}|/|T| ☞ -1 Xi=(Yi-∑j∈G(i) Xj· λ(Δi|Δj))· λ (Δi|Δi) Return X1,…, Xx. G(i): All the indices j, except i itself, such that Δj≽Δi. Open Problems ☞ In general, it is not clear which graph problems can be solved with much smaller space in the random order stream than in the adversary order stream. ☞ What can we say about testing graph properties of unbounded planar (or minor-free) graphs in data streams? Thank You (Almost) Isomorphic Graphs Benjamini, Shapira, and Schramm, STOC’08 Newman and Sohler, STOC’11 G1 and G2 : (Ɛ,k,d)-hyperfinite graphs. If |F(G1,d)-F(G2,d)|1 ≤ Ɛdn, then G1 and G2 are Ɛ-close. G1 and G2 are Ɛ-close: If we insert/delete at most Ɛdn edges from G1, then G1 and G2 becomes isomorphic.
Recommended publications
  • On the Tree–Depth of Random Graphs Arxiv:1104.2132V2 [Math.CO] 15 Feb 2012
    On the tree–depth of random graphs ∗ G. Perarnau and O.Serra November 11, 2018 Abstract The tree–depth is a parameter introduced under several names as a measure of sparsity of a graph. We compute asymptotic values of the tree–depth of random graphs. For dense graphs, p n−1, the tree–depth of a random graph G is a.a.s. td(G) = n − O(pn=p). Random graphs with p = c=n, have a.a.s. linear tree–depth when c > 1, the tree–depth is Θ(log n) when c = 1 and Θ(log log n) for c < 1. The result for c > 1 is derived from the computation of tree–width and provides a more direct proof of a conjecture by Gao on the linearity of tree–width recently proved by Lee, Lee and Oum [?]. We also show that, for c = 1, every width parameter is a.a.s. constant, and that random regular graphs have linear tree–depth. 1 Introduction An elimination tree of a graph G is a rooted tree on the set of vertices such that there are no edges in G between vertices in different branches of the tree. The natural elimination scheme provided by this tree is used in many graph algorithmic problems where two non adjacent subsets of vertices can be managed independently. One good example is the Cholesky decomposition of symmetric matrices (see [?, ?, ?, ?]). Given an elimination tree, a distributed algorithm can be designed which takes care of disjoint subsets of vertices in different parallel processors. Starting arXiv:1104.2132v2 [math.CO] 15 Feb 2012 by the furthest level from the root, it proceeds by exposing at each step the vertices at a given depth.
    [Show full text]
  • Testing Isomorphism in the Bounded-Degree Graph Model (Preliminary Version)
    Electronic Colloquium on Computational Complexity, Revision 1 of Report No. 102 (2019) Testing Isomorphism in the Bounded-Degree Graph Model (preliminary version) Oded Goldreich∗ August 11, 2019 Abstract We consider two versions of the problem of testing graph isomorphism in the bounded-degree graph model: A version in which one graph is fixed, and a version in which the input consists of two graphs. We essentially determine the query complexity of these testing problems in the special case of n-vertex graphs with connected components of size at most poly(log n). This is done by showing that these problems are computationally equivalent (up to polylogarithmic factors) to corresponding problems regarding isomorphism between sequences (over a large alphabet). Ignoring the dependence on the proximity parameter, our main results are: 1. The query complexity of testing isomorphism to a fixed object (i.e., an n-vertex graph or an n-long sequence) is Θ(e n1=2). 2. The query complexity of testing isomorphism between two input objects is Θ(e n2=3). Testing isomorphism between two sequences is shown to be related to testing that two distributions are equivalent, and this relation yields reductions in three of the four relevant cases. Failing to reduce the problem of testing the equivalence of two distribution to the problem of testing isomorphism between two sequences, we adapt the proof of the lower bound on the complexity of the first problem to the second problem. This adaptation constitutes the main technical contribution of the current work. Determining the complexity of testing graph isomorphism (in the bounded-degree graph model), in the general case (i.e., for arbitrary bounded-degree graphs), is left open.
    [Show full text]
  • Practical Verification of MSO Properties of Graphs of Bounded Clique-Width
    Practical verification of MSO properties of graphs of bounded clique-width Ir`ene Durand (joint work with Bruno Courcelle) LaBRI, Universit´ede Bordeaux 20 Octobre 2010 D´ecompositions de graphes, th´eorie, algorithmes et logiques, 2010 Objectives Verify properties of graphs of bounded clique-width Properties ◮ connectedness, ◮ k-colorability, ◮ existence of cycles ◮ existence of paths ◮ bounds (cardinality, degree, . ) ◮ . How : using term automata Note that we consider finite graphs only 2/33 Graphs as relational structures For simplicity, we consider simple,loop-free undirected graphs Extensions are easy Every graph G can be identified with the relational structure (VG , edgG ) where VG is the set of vertices and edgG ⊆VG ×VG the binary symmetric relation that defines edges. v7 v6 v2 v8 v1 v3 v5 v4 VG = {v1, v2, v3, v4, v5, v6, v7, v8} edgG = {(v1, v2), (v1, v4), (v1, v5), (v1, v7), (v2, v3), (v2, v6), (v3, v4), (v4, v5), (v5, v8), (v6, v7), (v7, v8)} 3/33 Expression of graph properties First order logic (FO) : ◮ quantification on single vertices x, y . only ◮ too weak ; can only express ”local” properties ◮ k-colorability (k > 1) cannot be expressed Second order logic (SO) ◮ quantifications on relations of arbitrary arity ◮ SO can express most properties of interest in Graph Theory ◮ too complex (many problems are undecidable or do not have a polynomial solution). 4/33 Monadic second order logic (MSO) ◮ SO formulas that only use quantifications on unary relations (i.e., on sets). ◮ can express many useful graph properties like connectedness, k-colorability, planarity... Example : k-colorability Stable(X ) : ∀u, v(u ∈ X ∧ v ∈ X ⇒¬edg(u, v)) Partition(X1,..., Xm) : ∀x(x ∈ X1 ∨ .
    [Show full text]
  • Harary Polynomials
    numerative ombinatorics A pplications Enumerative Combinatorics and Applications ECA 1:2 (2021) Article #S2R13 ecajournal.haifa.ac.il Harary Polynomials Orli Herscovici∗, Johann A. Makowskyz and Vsevolod Rakitay ∗Department of Mathematics, University of Haifa, Israel Email: [email protected] zDepartment of Computer Science, Technion{Israel Institute of Technology, Haifa, Israel Email: [email protected] yDepartment of Mathematics, Technion{Israel Institute of Technology, Haifa, Israel Email: [email protected] Received: November 13, 2020, Accepted: February 7, 2021, Published: February 19, 2021 The authors: Released under the CC BY-ND license (International 4.0) Abstract: Given a graph property P, F. Harary introduced in 1985 P-colorings, graph colorings where each color class induces a graph in P. Let χP (G; k) counts the number of P-colorings of G with at most k colors. It turns out that χP (G; k) is a polynomial in Z[k] for each graph G. Graph polynomials of this form are called Harary polynomials. In this paper we investigate properties of Harary polynomials and compare them with properties of the classical chromatic polynomial χ(G; k). We show that the characteristic and the Laplacian polynomial, the matching, the independence and the domination polynomials are not Harary polynomials. We show that for various notions of sparse, non-trivial properties P, the polynomial χP (G; k) is, in contrast to χ(G; k), not a chromatic, and even not an edge elimination invariant. Finally, we study whether the Harary polynomials are definable in monadic second-order Logic. Keywords: Generalized colorings; Graph polynomials; Courcelle's Theorem 2020 Mathematics Subject Classification: 05; 05C30; 05C31 1.
    [Show full text]
  • Every Monotone Graph Property Is Testable∗
    Every Monotone Graph Property is Testable∗ Noga Alon † Asaf Shapira ‡ Abstract A graph property is called monotone if it is closed under removal of edges and vertices. Many monotone graph properties are some of the most well-studied properties in graph theory, and the abstract family of all monotone graph properties was also extensively studied. Our main result in this paper is that any monotone graph property can be tested with one-sided error, and with query complexity depending only on . This result unifies several previous results in the area of property testing, and also implies the testability of well-studied graph properties that were previously not known to be testable. At the heart of the proof is an application of a variant of Szemer´edi’s Regularity Lemma. The main ideas behind this application may be useful in characterizing all testable graph properties, and in generally studying graph property testing. As a byproduct of our techniques we also obtain additional results in graph theory and property testing, which are of independent interest. One of these results is that the query complexity of testing testable graph properties with one-sided error may be arbitrarily large. Another result, which significantly extends previous results in extremal graph-theory, is that for any monotone graph property P, any graph that is -far from satisfying P, contains a subgraph of size depending on only, which does not satisfy P. Finally, we prove the following compactness statement: If a graph G is -far from satisfying a (possibly infinite) set of monotone graph properties P, then it is at least δP ()-far from satisfying one of the properties.
    [Show full text]
  • Graph Properties and Hypergraph Colourings
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Elsevier - Publisher Connector Discrete Mathematics 98 (1991) 81-93 81 North-Holland Graph properties and hypergraph colourings Jason I. Brown Department of Mathematics, York University, 4700 Keele Street, Toronto, Ont., Canada M3l lP3 Derek G. Corneil Department of Computer Science, University of Toronto, Toronto, Ont., Canada MSS IA4 Received 20 December 1988 Revised 13 June 1990 Abstract Brown, J.I., D.G. Corneil, Graph properties and hypergraph colourings, Discrete Mathematics 98 (1991) 81-93. Given a graph property P, graph G and integer k 20, a P k-colouring of G is a function Jr:V(G)+ (1,. ) k} such that the subgraph induced by each colour class has property P. When P is closed under induced subgraphs, we can construct a hypergraph HG such that G is P k-colourable iff Hg is k-colourable. This correlation enables us to derive interesting new results in hypergraph chromatic theory from a ‘graphic’ approach. In particular, we build vertex critical hypergraphs that are not edge critical, construct uniquely colourable hypergraphs with few edges and find graph-to-hypergraph transformations that preserve chromatic numbers. 1. Introduction A property P is a collection of graphs (closed under isomorphism) containing K, and K, (all graphs considered here are finite); P is hereditary iff P is closed under induced subgraphs and nontrivial iff P does not contain every graph. Any graph G E P is called a P-graph. Throughout, we shall only be interested in hereditary and nontrivial properties, and P will always denote such a property.
    [Show full text]
  • Isomorphism and Embedding Problems for Infinite Limits of Scale
    Isomorphism and Embedding Problems for Infinite Limits of Scale-Free Graphs Robert D. Kleinberg ∗ Jon M. Kleinberg y Abstract structure of finite PA graphs; in particular, we give a The study of random graphs has traditionally been characterization of the graphs H for which the expected dominated by the closely-related models (n; m), in number of subgraph embeddings of H in an n-node PA which a graph is sampled from the uniform distributionG graph remains bounded as n goes to infinity. on graphs with n vertices and m edges, and (n; p), in n G 1 Introduction which each of the 2 edges is sampled independently with probability p. Recen tly, however, there has been For decades, the study of random graphs has been dom- considerable interest in alternate random graph models inated by the closely-related models (n; m), in which designed to more closely approximate the properties of a graph is sampled from the uniformG distribution on complex real-world networks such as the Web graph, graphs with n vertices and m edges, and (n; p), in n G the Internet, and large social networks. Two of the most which each of the 2 edges is sampled independently well-studied of these are the closely related \preferential with probability p.The first was introduced by Erd}os attachment" and \copying" models, in which vertices and R´enyi in [16], the second by Gilbert in [19]. While arrive one-by-one in sequence and attach at random in these random graphs have remained a central object \rich-get-richer" fashion to d earlier vertices.
    [Show full text]
  • Distributed Testing of Graph Isomorphism in the CONGEST Model
    Distributed Testing of Graph Isomorphism in the CONGEST model Reut Levi∗ Moti Medina† Abstract In this paper we study the problem of testing graph isomorphism (GI) in the CONGEST distributed model. In this setting we test whether the distributive network, GU , is isomorphic to GK which is given as an input to all the nodes in the network, or alternatively, only to a single node. We first consider the decision variant of the problem in which the algorithm should dis- tinguish the case where GU and GK are isomorphic from the case where GU and GK are not isomorphic. Specifically, if GU and GK are not isomorphic then w.h.p. at least one node should output reject and otherwise all nodes should output accept. We provide a randomized algorithm with O(n) rounds for the setting in which GK is given only to a single node. We prove that for this setting the number of rounds of any deterministic algorithm is Ω(˜ n2) rounds, where n denotes the number of nodes, which implies a separation between the randomized and the deterministic complexities of deciding GI. Our algorithm can be adapted to the semi-streaming model, where a single pass is performed and O˜(n) bits of space are used. We then consider the property testing variant of the problem, where the algorithm is only required to distinguish the case that GU and GK are isomorphic from the case that GU and GK are far from being isomorphic (according to some predetermined distance measure). We show that every (possibly randomized) algorithm, requires Ω(D) rounds, where D denotes the diameter of the network.
    [Show full text]
  • Tree-Decomposition Graph Minor Theory and Algorithmic Implications
    DIPLOMARBEIT Tree-Decomposition Graph Minor Theory and Algorithmic Implications Ausgeführt am Institut für Diskrete Mathematik und Geometrie der Technischen Universität Wien unter Anleitung von Univ.Prof. Dipl.-Ing. Dr.techn. Michael Drmota durch Miriam Heinz, B.Sc. Matrikelnummer: 0625661 Baumgartenstraße 53 1140 Wien Datum Unterschrift Preface The focus of this thesis is the concept of tree-decomposition. A tree-decomposition of a graph G is a representation of G in a tree-like structure. From this structure it is possible to deduce certain connectivity properties of G. Such information can be used to construct efficient algorithms to solve problems on G. Sometimes problems which are NP-hard in general are solvable in polynomial or even linear time when restricted to trees. Employing the tree-like structure of tree-decompositions these algorithms for trees can be adapted to graphs of bounded tree-width. This results in many important algorithmic applications of tree-decomposition. The concept of tree-decomposition also proves to be useful in the study of fundamental questions in graph theory. It was used extensively by Robertson and Seymour in their seminal work on Wagner’s conjecture. Their Graph Minors series of papers spans more than 500 pages and results in a proof of the graph minor theorem, settling Wagner’s conjecture in 2004. However, it is not only the proof of this deep and powerful theorem which merits mention. Also the concepts and tools developed for the proof have had a major impact on the field of graph theory. Tree-decomposition is one of these spin-offs. Therefore, we will study both its use in the context of graph minor theory and its several algorithmic implications.
    [Show full text]
  • Testing Graph Isomorphism ∗
    Testing Graph Isomorphism ¤ Eldar Fischer y Arie Matsliah z Abstract ¡n¢ Two graphs G and H on n vertices are ²-far from being isomorphic if at least ² 2 edges must be added or removed from E(G) in order to make G and H isomorphic. In this paper we deal with the question of how many queries are required to distinguish between the case that two graphs are isomorphic, and the case that they are ²-far from being isomorphic. A query is defined as probing the adjacency matrix of any one of the two graphs, i.e. asking if a pair of vertices forms an edge of the graph or not. We investigate both one-sided error and two-sided error testers under two possible settings: The first setting is where both graphs need to be queried; and the second setting is where one of the graphs is fully known to the algorithm in advance. We prove that the query complexity of the best one-sided error testing algorithm is £(e n3=2) if both graphs need to be queried, and that it is £(e n) if one of the graphs is known in advance (where the £e notation hides polylogarithmic factors in the upper bounds). For two-sided error p testers, we prove that the query complexity of the best tester is £(e n) when one of the graphs is known in advance, and we show that the query complexity lies between ­(n) and Oe(n5=4) if both G and H need to be queried. All of our algorithms are additionally non-adaptive, while all of our lower bounds apply for adaptive testers as well as non-adaptive ones.
    [Show full text]
  • Elimination Graphs⋆
    Elimination Graphs⋆ Yuli Ye and Allan Borodin Department of Computer Science University of Toronto Toronto, Ontario, Canada M5S 3G4 {y3ye,bor}@cs.toronto.edu Abstract. In this paper, we study graphs with inductive neighborhood prop- erties. Let P be a graph property, a graph G = (V,E) with n vertices is said to have an inductive neighborhood property with respect to P if there is an ordering of vertices v1,...,vn such that the property P holds on the induced subgraph G[N(vi) ∩ Vi], where N(vi) is the neighborhood of vi and Vi = {vi,...,vn}. It turns out if we take P as a graph with maximum inde- pendent set size no greater than k, then this definition gives a natural gener- alization of both chordal graphs and (k + 1)-claw-free graphs. We refer to such graphs as inductive k-independent graphs. We study properties of such fami- lies of graphs, and we show that several natural classes of graphs are inductive k-independent for small k. In particular, any intersection graph of translates of a convex object in a two dimensional plane is an inductive 3-independent graph; furthermore, any planar graph is an inductive 3-independent graph. For any fixed constant k, we develop simple, polynomial time approximation algo- rithms for inductive k-independent graphs with respect to several well-studied NP-complete problems. Our generalized formulation unifies and extends sev- eral previously known results. 1 Introduction The main challenge of studying many graph theoretical problems is the size and variety of the graph itself.
    [Show full text]
  • Spectral Graph Theory
    Spectral Graph Theory Max Hopkins Dani¨elKroes Jiaxi Nie [email protected] [email protected] [email protected] Jason O'Neill Andr´esRodr´ıguezRey Nicholas Sieger [email protected] [email protected] [email protected] Sam Sprio [email protected] Winter 2020 Quarter Abstract Spectral graph theory is a vast and expanding area of combinatorics. We start these notes by introducing and motivating classical matrices associated with a graph, and then show how to derive combinatorial properties of a graph from the eigenvalues of these matrices. We then examine more modern results such as polynomial interlacing and high dimensional expanders. 1 Introduction These notes are comprised from a lecture series for graduate students in combinatorics at UCSD during the Winter 2020 Quarter. The organization of these expository notes is as follows. Each section corresponds to a fifty minute lecture given as part of the seminar. The first set of sections loosely deals with associating some specific matrix to a graph and then deriving combinatorial properties from its spectrum, and the second half focus on expanders. Throughout we use standard graph theory notation. In particular, given a graph G, we let V (G) denote its vertex set and E(G) its edge set. We write e(G) = jE(G)j, and for (possibly non- disjoint) sets A and B we write e(A; B) = jfuv 2 E(G): u 2 A; v 2 Bgj. We let N(v) denote the neighborhood of the vertex v and let dv denote its degree. We write u ∼ v when uv 2 E(G).
    [Show full text]